Toggle navigation
Patchwork
linux-kernel
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Series =
Allow tasks to have their user stack pointer sanity checked
| State =
Action Required
| Archived =
No
| 4 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Search
Archived
No
Yes
Both
Delegate
------
Nobody
andy.doan@linaro.org
andy.doan@linaro.org
Apply
Patch
Series
S/W/F
Date
Submitter
Delegate
State
[RFC,4/4] arm64: Check user stack pointer on syscall entry
Allow tasks to have their user stack pointer sanity checked
-
-
-
2019-02-11
Will Deacon
New
[RFC,3/4] mm: Add kconfig entries for user stack pointer checking
Allow tasks to have their user stack pointer sanity checked
-
-
-
2019-02-11
Will Deacon
New
[RFC,2/4] mm: Expose user stack pointer checking via prctl()
Allow tasks to have their user stack pointer sanity checked
-
-
-
2019-02-11
Will Deacon
New
[RFC,1/4] mm: Check user stack pointer is mapped with MAP_STACK
Allow tasks to have their user stack pointer sanity checked
-
-
-
2019-02-11
Will Deacon
New